Research Article
Secure Smart Healthcare Monitoring in Industrial Internet of Things (IIoT) Ecosystem with Cosine Function Hybrid Chaotic Map Encryption
Table 14
Fair comparative discussion amongst the monitoring and surveillance architecture.
| Algorithms | Image size | Key length | Speed | Entropies | CCxy | NPCR | UACI |
| STC-IES | 512 × 512 [3] | 2256 | 0.2205–0.2541 | 7.9989 | 0.0011 | 99.6536 | 33.4086 | [20] | 512 × 512 [3] | 1090 | 0.6708 | 7.9998 | 0.0035 | 99.6125 | 33.4451 | [39] | 640 × 480 [3] | 2372 | 0.95/0.96 | 7.9994 | 0.0021 | 99.609 | 33.465 | [41] | Keyframe 0065 | 2711 | 2.58 | 7.9998 | 0.0019 | 99.609 | 33.450 | [42] | 1024 × 1024 [3] | 2300 | NA | 7.91 | 0.003 | 99.5826 | 33.4213 | [50] | 512 × 512 [3] | 2256 | 0.2811–0.3119 | 7.9991 | 0.0015 | 99.6212 | 33.4406 | [71] | Keyframe 640 × 480 [3] | 2192 | 0.790 | NA | 0.0035 | 99.615 | 33.4658 |
|
|